CVE-2012-2123
kernel: fcaps: clear the same personality flags as suid when fcaps are used
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
La función cap_bprm_set_creds en security/commoncap.c en el núcleo de Linux antes de v3.3.3 no controla correctamente el uso de las capacidades del sistema de archivos (FCAPS aka) para la implementación de un archivo ejecutable con privilegios, lo cual permite a usuarios locales eludir las restricciones personales a través de una aplicación manipulada, como se demuestra por un ataque que utiliza un proceso padre para desactivar ASLR.
A flaw was found in the Linux's kernels ext4 file system when mounted with a journal. A local, unprivileged user could exploit this flaw to cause a denial of service. A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual cpu setup. An unprivileged local user could exploit this flaw to crash the system leading to a denial of service. Steve Grubb reported a flaw with Linux fscaps (file system base capabilities) when used to increase the permissions of a process. For application on which fscaps are in use a local attacker can disable address space randomization to make attacking the process with raised privileges easier. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-04-04 CVE Reserved
- 2012-05-11 CVE Published
- 2024-08-06 CVE Updated
- 2025-05-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445 | Broken Link | |
http://www.openwall.com/lists/oss-security/2012/04/20/6 | Mailing List |
|
http://www.securityfocus.com/bid/53166 | Third Party Advisory | |
http://www.securitytracker.com/id?1027072 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75043 | Vdb Entry | |
https://github.com/torvalds/linux/commit/d52fc5dde171f030170a6cb78034d166b13c9445 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-0670.html | 2023-10-12 | |
http://rhn.redhat.com/errata/RHSA-2012-0743.html | 2023-10-12 | |
http://www.debian.org/security/2012/dsa-2469 | 2023-10-12 | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.3 | 2023-10-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=806722 | 2012-06-18 | |
https://access.redhat.com/security/cve/CVE-2012-2123 | 2012-06-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.0.29 Search vendor "Linux" for product "Linux Kernel" and version " < 3.0.29" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.1 < 3.2.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.1 < 3.2.16" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.3.3 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.3.3" | - |
Affected
|